getMaliciousURIs
List of Malicious Entry URI in Cyber Tactical Database
Return list of Malicious Entry URI in Cyber Tactical Database
/malicious/uri
Usage and SDK Samples
curl -X GET -H "x-api-key: [[apiKey]]" "http://api.ctd.activedefense.co.jp/v2/malicious/uri?type="
import io.swagger.client.*;
import io.swagger.client.auth.*;
import io.swagger.client.model.*;
import io.swagger.client.api.MaliciousUriApi;
import java.io.File;
import java.util.*;
public class MaliciousUriApiExample {
public static void main(String[] args) {
ApiClient defaultClient = Configuration.getDefaultApiClient();
// Configure API key authorization: APIKeyHeader
ApiKeyAuth APIKeyHeader = (ApiKeyAuth) defaultClient.getAuthentication("APIKeyHeader");
APIKeyHeader.setApiKey("YOUR API KEY");
// Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null)
//APIKeyHeader.setApiKeyPrefix("Token");
MaliciousUriApi apiInstance = new MaliciousUriApi();
String type = type_example; // String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.
try {
array[MaliciousUri] result = apiInstance.getMaliciousURIs(type);
System.out.println(result);
} catch (ApiException e) {
System.err.println("Exception when calling MaliciousUriApi#getMaliciousURIs");
e.printStackTrace();
}
}
}
import io.swagger.client.api.MaliciousUriApi;
public class MaliciousUriApiExample {
public static void main(String[] args) {
MaliciousUriApi apiInstance = new MaliciousUriApi();
String type = type_example; // String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.
try {
array[MaliciousUri] result = apiInstance.getMaliciousURIs(type);
System.out.println(result);
} catch (ApiException e) {
System.err.println("Exception when calling MaliciousUriApi#getMaliciousURIs");
e.printStackTrace();
}
}
}
Configuration *apiConfig = [Configuration sharedConfig];
// Configure API key authorization: (authentication scheme: APIKeyHeader)
[apiConfig setApiKey:@"YOUR_API_KEY" forApiKeyIdentifier:@"x-api-key"];
// Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
//[apiConfig setApiKeyPrefix:@"Bearer" forApiKeyIdentifier:@"x-api-key"];
String *type = type_example; // \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists. (optional)
MaliciousUriApi *apiInstance = [[MaliciousUriApi alloc] init];
// List of Malicious Entry URI in Cyber Tactical Database
[apiInstance getMaliciousURIsWith:type
completionHandler: ^(array[MaliciousUri] output, NSError* error) {
if (output) {
NSLog(@"%@", output);
}
if (error) {
NSLog(@"Error: %@", error);
}
}];
var CyberTacticalDatabaseApi = require('cyber_tactical_database_api');
var defaultClient = CyberTacticalDatabaseApi.ApiClient.instance;
// Configure API key authorization: APIKeyHeader
var APIKeyHeader = defaultClient.authentications['APIKeyHeader'];
APIKeyHeader.apiKey = "YOUR API KEY"
// Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null)
//APIKeyHeader.apiKeyPrefix['x-api-key'] = "Token"
var api = new CyberTacticalDatabaseApi.MaliciousUriApi()
var opts = {
'type': type_example // {String} \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.
};
var callback = function(error, data, response) {
if (error) {
console.error(error);
} else {
console.log('API called successfully. Returned data: ' + data);
}
};
api.getMaliciousURIs(opts, callback);
using System;
using System.Diagnostics;
using IO.Swagger.Api;
using IO.Swagger.Client;
using IO.Swagger.Model;
namespace Example
{
public class getMaliciousURIsExample
{
public void main()
{
// Configure API key authorization: APIKeyHeader
Configuration.Default.ApiKey.Add("x-api-key", "YOUR_API_KEY");
// Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
// Configuration.Default.ApiKeyPrefix.Add("x-api-key", "Bearer");
var apiInstance = new MaliciousUriApi();
var type = type_example; // String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists. (optional)
try
{
// List of Malicious Entry URI in Cyber Tactical Database
array[MaliciousUri] result = apiInstance.getMaliciousURIs(type);
Debug.WriteLine(result);
}
catch (Exception e)
{
Debug.Print("Exception when calling MaliciousUriApi.getMaliciousURIs: " + e.Message );
}
}
}
}
<?php
require_once(__DIR__ . '/vendor/autoload.php');
// Configure API key authorization: APIKeyHeader
Swagger\Client\Configuration::getDefaultConfiguration()->setApiKey('x-api-key', 'YOUR_API_KEY');
// Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
// Swagger\Client\Configuration::getDefaultConfiguration()->setApiKeyPrefix('x-api-key', 'Bearer');
$api_instance = new Swagger\Client\Api\MaliciousUriApi();
$type = type_example; // String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.
try {
$result = $api_instance->getMaliciousURIs($type);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling MaliciousUriApi->getMaliciousURIs: ', $e->getMessage(), PHP_EOL;
}
?>
use Data::Dumper;
use WWW::SwaggerClient::Configuration;
use WWW::SwaggerClient::MaliciousUriApi;
# Configure API key authorization: APIKeyHeader
$WWW::SwaggerClient::Configuration::api_key->{'x-api-key'} = 'YOUR_API_KEY';
# uncomment below to setup prefix (e.g. Bearer) for API key, if needed
#$WWW::SwaggerClient::Configuration::api_key_prefix->{'x-api-key'} = "Bearer";
my $api_instance = WWW::SwaggerClient::MaliciousUriApi->new();
my $type = type_example; # String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.
eval {
my $result = $api_instance->getMaliciousURIs(type => $type);
print Dumper($result);
};
if ($@) {
warn "Exception when calling MaliciousUriApi->getMaliciousURIs: $@\n";
}
from __future__ import print_statement
import time
import swagger_client
from swagger_client.rest import ApiException
from pprint import pprint
# Configure API key authorization: APIKeyHeader
swagger_client.configuration.api_key['x-api-key'] = 'YOUR_API_KEY'
# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
# swagger_client.configuration.api_key_prefix['x-api-key'] = 'Bearer'
# create an instance of the API class
api_instance = swagger_client.MaliciousUriApi()
type = type_example # String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists. (optional)
try:
# List of Malicious Entry URI in Cyber Tactical Database
api_response = api_instance.get_malicious_ur_is(type=type)
pprint(api_response)
except ApiException as e:
print("Exception when calling MaliciousUriApi->getMaliciousURIs: %s\n" % e)
Parameters
Query parameters
Name | Description |
---|---|
type |
String
\"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.
|